2. The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)

physical

session*

network

presentation*

data link

transport

application*

3. Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

internetwork

session

presentation

application*

network access

4. What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

responsibility for logical addressing

responsibility for physical addressing

the creation and maintenance of dialogue between source and destination applications*

closest to the end user*

the establishing of window size

5. A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)

FTP*

HTTP*

DNS

SNMP

DHCP

SMTP*

6. What is an example of network communication that uses the client-server model?

A user uses eMule to download a file that is shared by a friend after the file location is determined.

A workstation initiates an ARP to find the MAC address of a receiving host.

A user prints a document by using a printer that is attached to a workstation of a coworker.

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.*

7. Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

peer-to-peer*

client-based

master-slave

point-to-point

8. What do the client/server and peer-to-peer network models have in common?

Both models have dedicated servers.

Both models support devices in server and client roles.*

Both models require the use of TCP/IP-based protocols.

Both models are used only in the wired network environment.

9. What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until they are manually deleted from the email client.*

When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.

IMAP sends and retrieves email, but POP only retrieves email.

POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.